1 HW ( ) - ( ) 2 3 HAZOP (1) (2) (3) 1 (4) (5) (6) (7) (1)-(7) 3. HAZOP HAZOP 3.1 IEC ) HAZOP 1 2 c 2009 Informa

Similar documents
IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

fiš„v8.dvi

DEIM Forum 2014 D3-5 DSMS DSMS DSMS 2.13% RTOS Realtime-Aware Efficient Query Processing for Automotiv

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

DEIM Forum 2015 E4-5 DSMS DSMS DSMS 32% 46% RTOS Priority Inversion Time

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

Computer Security Symposium October 2013 Android OS kub

"CAS を利用した Single Sign On 環境の構築"

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

1 7.35% 74.0% linefeed point c 200 Information Processing Society of Japan

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-HPC-139 No /5/29 Gfarm/Pwrake NICT NICT 10TB 100TB CPU I/O HPC I/O NICT Gf

3_39.dvi

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

ECU RTOS 1),2) µitron 3) OSEK OS 4) API API DUOS Dual API Real-time OS ECU RTOS RTOS DUOS API ECU-A アプリケーションA RTOS-A CPU 30MHz ECU-B アプリケーションB RTOS-B

MDD PBL ET 9) 2) ET ET 2.2 2), 1 2 5) MDD PBL PBL MDD MDD MDD 10) MDD Executable UML 11) Executable UML MDD Executable UML

DEIM Forum 2009 E

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

IPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of

6_27.dvi

[2] , [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

IPSJ SIG Technical Report , 2 Andorid Capture-A-Moment Capture-A-Moment Capturing System by SmartPhone to Record Real-Time Scene Kohei Takada,

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

IPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc

1 3DCG [2] 3DCG CG 3DCG [3] 3DCG 3 3 API 2 3DCG 3 (1) Saito [4] (a) 1920x1080 (b) 1280x720 (c) 640x360 (d) 320x G-Buffer Decaudin[5] G-Buffer D

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St

日本感性工学会論文誌

Microsoft Word - toyoshima-deim2011.doc

7,, i

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S

Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

IPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions

DEIM Forum 2009 B4-6, Str

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

9_18.dvi

P2P P2P peer peer P2P peer P2P peer P2P i


Iteration 0 Iteration 1 1 Iteration 2 Iteration 3 N N N! N 1 MOPT(Merge Optimization) 3) MOPT MOP

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

Windows7 OS Focus Follows Click, FFC FFC focus follows mouse, FFM Windows Macintosh FFC n n n n ms n n 4.2 2

1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N

Web Web Web Web Web, i

知能と情報, Vol.30, No.5, pp

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

5) 2. Geminoid HI-1 6) Telenoid 7) Geminoid HI-1 Geminoid HI-1 Telenoid Robot- PHONE 8) RobotPHONE 11 InterRobot 9) InterRobot InterRobot irt( ) 10) 4

1 UD Fig. 1 Concept of UD tourist information system. 1 ()KDDI UD 7) ) UD c 2010 Information Processing S

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

PowerPoint

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

untitled

untitled


TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

修士論文

. IDE JIVE[1][] Eclipse Java ( 1) Java Platform Debugger Architecture [5] 3. Eclipse GUI JIVE 3.1 Eclipse ( ) 1 JIVE Java [3] IDE c 016 Information Pr

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

Vol.53 No (Aug. 2012) BibTEX 1 2,a) , bole BibTEX BibTEX 1 BibTeX Literature Management System Based on BibTEX for L

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

Vol. 44 No. 12 Dec , 3 4 Development and Evaluation of Information Provision System for In-Vehicle Terminal Based on Agent Framework Masa

IPSJ SIG Technical Report Vol.2011-DBS-153 No /11/3 Wikipedia Wikipedia Wikipedia Extracting Difference Information from Multilingual Wiki

DEIM Forum 2010 D Development of a La

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

1_26.dvi

SEJulyMs更新V7

( ) fnirs ( ) An analysis of the brain activity during playing video games: comparing master with not master Shingo Hattahara, 1 Nobuto Fuji

1: ( 1) 3 : 1 2 4

LAN LAN LAN LAN LAN LAN,, i

2. IEC61508 ISO WD IEC6150 SIL( Safety Integrity Level ) ISO WD2626 ASIL( Automotive Safety Integrity Level ) SIL/ASIL (tolerable risk) (Residu

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f

,,,,., C Java,,.,,.,., ,,.,, i

dsample.dvi

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

Fig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system

12) NP 2 MCI MCI 1 START Simple Triage And Rapid Treatment 3) START MCI c 2010 Information Processing Society of Japan

Transcription:

HAZOP 1 1 3 2 2 HAZOP A Method of Deriving Anomaly Detection Rule by HAZOP Analysis Takahiro Hidaka, 1 Fumio Yamazaki, 1 Yukikazu Nakamoto, 3 Shinya Honda 2 and Hiroaki Takada 2 With enlargement the scale of automotive systems, it becomes harder to verify by traditional method. In this study, we propose to derive anomaly detection rule from result of HAZOP. And we evaluate this method by example and implementation. We show this method is valid for component oriented software, and easy to adopt rule for constraint of embedded system. 1. AUTOSAR FMEA FTA HAZOP 1) HAZOP 1 Center for Embedded Computing Systems, Nagoya University 2 Graduate School of Information Science Nagoya University 3 Center for Embedded Computing Systems, Nagoya University / Graduate School of Applied Informatics University of Hyogo 1 c 2009 Information Processing Society of Japan

1 HW - - - ( ) - ( ) 2 3 HAZOP 4 5 6 1 2. 2.1 3 1 2.2 1 (1) (2) (3) 1 (4) (5) (6) (7) (1)-(7) 3. HAZOP HAZOP 3.1 IEC 61882 2) HAZOP 1 2 c 2009 Information Processing Society of Japan

2 2 HAZOP no - less - - - more - - - other than - - - - part of - - - - reverse - - - - early - - - - late - - - - 3) IEC 61508 4) HAZOP HAZOP HAZOP ( 1 ) ( 2 ) ( 3 ) 3 3.2 HAZOP 2 R( ) 2 HAZOP 3 1 30 (30fps) 2 no, less, more ( ) ECU HAZOP 4 no late 3 3 2 3 3 c 2009 Information Processing Society of Japan

3 HAZOP = 30(fps) no 4 less 3 more, 3 part of 3 reverse 3 other than 2-100 < < 100 no 2 less 3 more 3 = {P, R, N, D, 2} no 2 reverse 3 other than 3 = 30(fps) no 4 less 3 more 1 part of 3 reverse 3 < 30(ms) late 4 3.3 HAZOP ( 3) HAZOP HAZOP HAZOP 4 4 4 (s) no 1 4 less fps < 20 3 3 more fps > 30 3 3 part of CRC 1 3 reverse CRC 1 3 other than - - - - no 60 2 less < -100 3 more > 100 3 no 60 2 reverse = 3 other than = 1 3 no 1 4 less fps < 20 3 3 more fps > 30 3 1 part of CRC 1 3 reverse CRC 1 3 late - > 30ms 4 less fps<20 part of/reverse CRC HAZOP 4. Unix OS 3 2 5 4 c 2009 Information Processing Society of Japan

libdtrace 6) no, less, more, other than, early, late 2 part of, reverse DTrace D 1 syscall read/write profile 1 1 D 3 5 HAZOP DTrace TCP/IP 4.1 DTrace Sun Microsystems DTrace 5) DTrace Solaris FreeBSD MacOSX OS OS D DTrace OS count() 1 interval.d 1 syscall :: write : entry 2 / pid == $target && trace_count_rw / 3 { 4 @write_count [ arg0 ] = count (); 5 } 6 syscall :: read : entry 7 / pid == $target && trace_count_rw / 8 { 9 @read_count [ arg0 ] = count (); 10 } 11 profile :: tick -1s 12 / trace_count_rw / 13 { 14 printa (" MSG : count_rw write sock=%d, count=% @d\n", @write_count ); 15 printa (" MSG : count_rw read sock=%d, count=% @d\n", @read_count ); 16 clear ( @write_count ); 17 clear ( @read_count ); 18 } / 2 syscall read DTrace copyin() 5 c 2009 Information Processing Society of Japan

1 self int read_sock ; 2 self int read_buf ; 3 2 4 syscall :: read : entry 5 / pid == $target / 6 { 7 self ->read_sock = arg0 ; 8 self ->read_buf = arg1 ; 9 } 10 syscall :: read : return 11 / pid == $target && 0 < arg0 && trace_value / 12 { 13 printf (" MSG : value read sock =%d, buffer =%d\n", 14 self ->read_sock, 15 *(( char *) copyin (self ->read_buf, 1))); 16 } value.d 実行時間 (%) 45 40 35 30 25 20 15 10 5 0 no null noval all メモリ使用量 (KB) 6000 5000 4000 3000 2000 1000 0 メモリ使用量 user 時間 sys 時間 4.2 libdtrace D DTrace D SIGTERM 5. 4 Intel Core2Duo + VMware Server no:, null:, noval:, all: 4 all noval 4 4 実行時間比 1.1 1.08 1.06 1.04 1.02 1 0.98 user 時間 sys 時間 0.96 no null noval all 5 user /sys ( :%) mem( :KB) 5 (user,sys) 1 8% 4 6% 6 c 2009 Information Processing Society of Japan

6 MAPE-K MAPE-K Monitor DTrace Analysis Plan - - Execution Knowledge HAZOP 6 MAPE-K 3MB DTrace 6. IBM 6 MAPE-K 7) IBM 8) MAPE-K Monitor,Analysis,Plan,Execution,Knowledge 5 6 MAPE-K Knowledge,Analysis HAZOP Monitor DTrace Plan Plan (Anomaly detection) (Intrusion Detection System) 2 9) CPU 10) 11) HAZOP 7. HAZOP DTrace 7 c 2009 Information Processing Society of Japan

HAZOP CRC MAPE-K Plan RTOS BR OS on Object/Component/Service-Oriented Real-Time Distributed Computing, pp.257 266 (2009). 11) Waizumi, Y., Kudo, D., Kato, N. and Nemoto, Y.: A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics, Computational Intelligence and Security, Splinger Verlag., pp.252 259 (2005). 1) ISO13849-1(JIS B9705-1) IEC60204-1(JIS B9960-1) IEC61508(JIS C0508) ( ) (2007). 2) IEC 61882: Hazard and operability studies (HAZOP studies)- Application Guide (2001). 3) Redmill, F., Chudleigh, M. and Richard, J.C.: System Safety: HAZOP and Software HAZOP, Wiley-Blackwell (1999). 4) IEC 61508: Functional safety of electrical/electronic/programmable electronic safety-related systems (2005). 5) McDougall, R., Mauro, J. and Gregg, B.: Solaris Performance and Tools : DTrace and Mdb Techniques for Solaris 10 and OpenSolaris, Prentice Hall (2006). 6) Sun Microsystems, Inc.: libdtrace(3lib), http://docs.sun.com/app/docs/doc/816-5173/6mbb8adt2. 7) IBM: An Architectural Blueprint for Autonomic Computing, http://www.ibm.com/autonomic/pdfs/ac Blueprint White Paper 4th.pdf (2006). 8) PROVISION 58, IBM (2008). 9) Meadows, C.: A Formal Framework and Evaluation Method for Network Denial of Service, Processings of the 1999 IEEE Computer Society Foundations Workshop, pp.4 13 (1999). 10) Sugaya, M., Ohno, Y., vander Zee, A. and Nakajima, T.: A Lightweight Anomaly Detection System for Information Appliances, Processings of IEEE Symposium 8 c 2009 Information Processing Society of Japan